Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 16:38

General

  • Target

    3b0a00c115ab91c70263b836f22e4ef1_JaffaCakes118.exe

  • Size

    160KB

  • MD5

    3b0a00c115ab91c70263b836f22e4ef1

  • SHA1

    74c6f0ad32a1a00818e075b51c54da3e2fccb42d

  • SHA256

    f7df27bca0394e6444320e648d5745689d220389a8ee71f0707f77f44397dfd6

  • SHA512

    c6a027f2a1553acdcd2a2df7cededad401392698b82c48a650dad3356eacebdb9058c59476287f13d16b3dd6f6f60bf0951ece6b476a172101a1e94c24d090a0

  • SSDEEP

    3072:r3NmvQ67uM6mCru+CEmDROT3F2Lyl6ENIAhJpvKh8gpjFF6u:RmYsuU1EmDRO74m6mjW8+jFX

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b0a00c115ab91c70263b836f22e4ef1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3b0a00c115ab91c70263b836f22e4ef1_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\SysWOW64\Explorer.exe
      Explorer http://911vpn.taobao.com
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2744
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://911vpn.taobao.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    938afbdac22e9d600df315d5e2584f25

    SHA1

    760953c384ea4ed9813126284779f9569b9b3d91

    SHA256

    84578ba21536e9fd3147a7cd375f6a4d96671850cfabb8d3e5072b3682cb05a5

    SHA512

    3e3abec9969773f575d2c60dc114ec41c7d69d0bba5b1ac05a37dcabb2930e6d3c140b3111a072cc579d9a8b92cf6ff9b49f25137476128c9fadb10af33d3c24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8815752358be68393d1c04e1e53d482

    SHA1

    1ffc3e55ee9e2200e49ca2c520f78c25ca515d66

    SHA256

    f60d22493e14b2e33de39474478f8917895778ed0de59eab5360cdef36c9aa2e

    SHA512

    f8ed278240eb67fd7d4eaf0e2a1c6005fe21509a3b52c27c51a49c0adf2fd8bfe7c4959ed066655cb3e8d68f423da9d6b586d5d3f5de5b5437afd0aa3bdfc102

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bbf14c2ae911f8e8eb61537ded5ab7d

    SHA1

    38fc59ab4bf760c56caf27d5caa8f463f8826ac7

    SHA256

    d0901eb04c797fb5aeeed48d0f6fdfbc3dfdb13445a6713cd955e1b01ebec68a

    SHA512

    823915d0dee92fcffcdf71869942a05db605ce7cbf599be50c6817f4336b48075a4dc2dc9dadab2925aaf35e4313e0b006d51293a4551b42357ecf2f1b94ccf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aed0fef04e1e9f522de158fa64cdc30d

    SHA1

    2e5d1606d44227e4d85b17d0ebaf3ad3ebcc73c4

    SHA256

    72a75dd15c80cd3fb6e92d1b8935b257c95ec3590f0227592090c2bda6610153

    SHA512

    6d1eefe62b7665811efeda332ebc4a42281ed361c18861ae5b6c70de3d9877052edee97a419c7af7416d778065a68c43d973ea17d7f7bbd94559b6efe49d05c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0a3ff760c9b13df94ebf19cf15fcf83

    SHA1

    9b8b44d40fe7dc61f215eea5869ffb488d749b3f

    SHA256

    7d4905b2c2dd941aa4a68d89772751bbb959364846834b3b6a9e49af87f6bdb7

    SHA512

    a515380c8e28c168fbc9d90f3d32ab60792db78f0d88db8b62ef0d8bacd356d3bc3f4f60591eb7c7e569d7bb8ebd70b6cd862fcca84de421a87fc399cc5a4a57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad94ea38384725ffd05756235d25a35a

    SHA1

    a25dfdcba15862a07b3821bcea9139491cdbd119

    SHA256

    d1a5c0ec063db0be2a2084358a3f6062dfd28aa061f377a259171298f4dceca9

    SHA512

    3e9e939020a071914825a24ae75dacfdf55d66b06f4dc407179e2c7fcd0c1aa7cc5e8de86df11a27e716f0befc5088b5ee036d8bc15371b6b7d558a9404c4018

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c6db06b73c4e9c9c41d85dd85cb4023

    SHA1

    0bce0471520d9d3cbc93f27bc18ce00563708526

    SHA256

    99ea78ad9f8d69a09e1d71633d6da141aa976229994dde087717a73ee80b82a3

    SHA512

    1d661dad81c52d0bdb6937517b2df26fe7cad49dca104409e318ea5fe175973ef6ed55940b362b180b209d58988468f19369353758b1aa81732194b81dfcee11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5ab485e9f888040e13e5ca95ed9fbe4

    SHA1

    042ac73e47b4df022fdc4a3ec2d143c1bf9987f9

    SHA256

    ebf8933d87194f877f8ea4cf1d4f9f3178022be8934d30f63e3c54a6a0ebbda6

    SHA512

    d82638c5b92f3e20a14dddc1d2236f8d8fa89325e7cff8eb9bd950bee6eb430914b2706a3b7e7201816b9e68bff74709acc17f3845e1bd704758c338b4fabd22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85c83d6b42c5841b2fae83c6054caa67

    SHA1

    382295c40865a10fcaf09c865bade1fb2ab7bd10

    SHA256

    ece106f019a2cd80c5bdce146083385756c6d1b901e439c7e640df98f1163248

    SHA512

    380e4526b757b1fa1a5c483f8243a0d8e62215a48d3a3fe7fd2d12cccc01b88f4b2800302a884d5ef3442136995a13246bdb1543c2eb7296f606399c82c07ddd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    246403c35222b350aef9842c5e37ca24

    SHA1

    767612a01de8419d4cfee793de8ef8f83d73b76b

    SHA256

    37df0782c72da168598e844ac99008bffe26693d5aa277fdf6dca5cee324e966

    SHA512

    63ffabc09ba16a807f43aa09e91e6f589dfd0834353f78a283c45b120c9a187fcc528b9e7b6c1eed491b788ce2fde042af4cde2e95d23d3958080c3bf31502de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64cdaaf19e707eb0b223eaa31bdc14ff

    SHA1

    650d9e535c370082862b224dcd4e7a2c63a59949

    SHA256

    51d287b4c47fea6bebccc7be9d4d3635c0926bbda4f3f42e04b8ba69888bcb78

    SHA512

    c84f0b151b568bac663bdee5358684fd450db460c4589793fd0d53bd6dce2d2c8c5cb6fe95a0c7b7a1005cbb12602c4813e4d1cf4a1f6fa90221eac5d01fadfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    761e8926987f98db27a219af79a3aba1

    SHA1

    88fe91f432ea16002e2fc3a4949ba5be5b6926c6

    SHA256

    c5570fe43767b54dd76bd6bd666905c65f23d77950ca1ed5b9cdd1d2f9014c0b

    SHA512

    d0096e60d40209949d25052748dddb5d65d00e9a6a9a35e0cd614d301c9cc6036314f266588721b1fed31eb56ffced47b3249a143d26e85dc4bfe90158a3272c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a758432f18f622c6e15fbec1455f6a2

    SHA1

    0b2ac03c24b02736bb102e8c84c2c8229bc0ab95

    SHA256

    659675e10a791b474a14f81cf86d1534adc54bd381b1ef37842032a302a246cc

    SHA512

    9f023e184c4ed7fd578ca968bf97b2d8e785dc8e3e3a0fc778b469f40689d81113140bfa78ec52ff01cdcc55e7e3276765cd7bcfa85a956fbb78a1b28a125191

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a24ff4773279cc7cb738ce6c95ef315f

    SHA1

    2e19bc83ef9dbf700aee105ae4ab28718ebc263c

    SHA256

    a4a915e299a3f899a145917231956cf2c616c4ead6aa7911e218c1a1e770510f

    SHA512

    dedd2d345e26a95ce1b299807ec353a9e623a62eb6c61372e5ca198aca5de71b42990de31648b8cebf6a68dc33aad45c40b1fd96c3441872bf408f9f63730a2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    526a51c682e346dd5402c9c876cb96d7

    SHA1

    149df517fefe88ce95ddf6e2520882a66b073736

    SHA256

    6b6591209ca4242a874ba81ba699e40348da23bc3d9ee836e464c282eb9a00a8

    SHA512

    6f9ad59b03cb79080a38c36b9024b6235c0d988ee05dee9ada21a427d30923c8f35d5b4f10319942cc1a7aacbd04c8be4c3271703ffed0e9c8d3ff9271885a0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bb6a2094af3142278e237efb0f9aea4

    SHA1

    c9f8636b516001811103479f59bab82e4ff3b273

    SHA256

    427f4867692c0a9eb494c5b38da53374b75ee97d4babb0c84bcf11e3749d6d47

    SHA512

    e3450fdd5ef93827548cee699f1e4feb6b89084cf24264465339b5ff6fcef11333c66e8398249fcca34f468aebbd26da6d5f980ecbc1eb05e29744bc8f021566

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d1e2e43c97091eee7de022f9606ca76

    SHA1

    e10baba699c19e89c2f2d1c0f790b501ca49c11c

    SHA256

    f2433a68795c81ec6b6075662509dbd049c6f1f548edf1c8b1e375fdb08129d2

    SHA512

    746e39f248b14c733db25f04e1b3f1756911dd2605b1941119a6515026ee95322b46b840e4568e2768c11837bfe4be405101fa54c9ed399eea94f2ca9858ee20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fea2aa11066899620350724a5070a05

    SHA1

    713369760bd263b7aa814df46d5c7f7168c2bdd2

    SHA256

    f3bd4011c07d3543cb2e2807ed1014a2e677e8ab4c4ea75096bc5afedc11e261

    SHA512

    0be8ecf2db89bbe34ce0e0f4c8d45d00c3a120f1db80be810892d08f3ff9ae7a353465b25e2ba8c1dbf1a0b2e73b2baa166f16c801594dbc10a7368b47deaa9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b09e6218a1270e9af529aecdc4d5570

    SHA1

    578ccd072ad86d66579eb98014fcb6de42c52ce6

    SHA256

    3d2da9d411ca8d6d4f0b35059a6f4233c371aa88d166e390994d58d6e182b4c6

    SHA512

    4adfcf6cd8b2fd84f84e32d7eb503c2708195a33452c98bd86b79dc22721985eac125994dcc949f8e5221b91776a82ca1c138df6fb8b5294b280ba22c714f7d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85029a569d100f56b84ad03b1dce4e3f

    SHA1

    87076cdb58c46e320fe13b753f64caa643cfce35

    SHA256

    072f01c045a68668186f68831c1387acdaea8fc884345f729544af1b7518dfa5

    SHA512

    c3836d12a0a1daf61b4cb1104aefdf17fc77403a4bdc239166c4468215b644cf1d846e40d33566e2f5515691f7fd8caf1f3acef219740f4bee865f44ace31e0e

  • C:\Users\Admin\AppData\Local\Temp\Cab589D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar594D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2128-4-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2128-1-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2128-0-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB